Download XSNet 1800 SW

Transcript
XSNet 1800 SW
(Firmware v.3)
Field-hardened layer-2 Ethernet switch with 2 optical 100Mbit uplinks + 4 10/100Base-T
ports
USER MANUAL
©Optelecom-NKF 2006
Version 1.0a (060604-1a)
XSNet1800SWv3 (MW03SP2)
Table of Contents
Part I: description, features, hardware installation......................................................... 3
1. General description ........................................................................................................................................3
2. Front panel features .......................................................................................................................................3
3. Installation.......................................................................................................................................................4
3.1. Initial configuration notes.........................................................................................................................4
3.2. Hardware installation ...............................................................................................................................4
3.3. Software installation.................................................................................................................................4
Part II: Configuration pages ....................................................................................................... 5
1. Logging in ........................................................................................................................................................5
2. XSNet 1800 Home page ..................................................................................................................................7
3. XSNet 1800 network settings .........................................................................................................................8
4. XSNet 1800 SW alarms ..................................................................................................................................9
5. 1800 SW VLANs ...........................................................................................................................................10
VLAN Control and VLAN Port Control .........................................................................................................11
Settings example ..............................................................................................................................................12
Application example ........................................................................................................................................13
6. XSNet 1800 SW Quality of Service (QoS) ..................................................................................................14
7. XSNet 1800 SNMP management by traps and/or polling ........................................................................15
Introduction .....................................................................................................................................................15
Traps.................................................................................................................................................................15
Polling ..............................................................................................................................................................16
8. XSNet 1800 SW RSTP..................................................................................................................................17
9. XSNet 1800 multicast settings .....................................................................................................................20
10. XSNet 1800 SW Port Settings....................................................................................................................21
11. XSNet 1800 SW port statistics ...................................................................................................................22
12. XSNet 1800 Reboot and restore ................................................................................................................23
13. Technical specifications..............................................................................................................................25
14. Safety, EMC and ESD information...........................................................................................................25
2
PLEASE READ THE DOCUMENT 'QUICK START' BEFORE INSTALLING THIS EQUIPMENT
XSNet 1800 SW v.3
Part I: description, features, hardware installation
1. General description
XSNet 1800 SW switches have four electrical Ethernet ports, and also
provide up to two independent 100 Mbit optical uplinks through either
dual multimode or dual single-mode fibres (one fibre pair per port), at
wavelengths of 850 nm (MM), 1310 nm, or CWDM (SM), the latter for
longer spans. Also available are medium-span models with one fibre
per optical port. The switch is built as a platform: for its uplink ports, it
uses SFP (Small Form factor Pluggable) packages. The units are
especially suitable for use in outdoor housings.
The non-blocking, highly configurable switches support the following
protocols: ARP, LLC, IP, UDP, IGMP, Spanning Tree (STP) and Rapid
Spanning Tree (RSTP).
Front panel status LEDs provide information about power, port speed
and port activity.
The switches come in the form of single-width (7TE) Eurocassettes
fitting in MC 11 or similar power supply cabinets, or as stand-alone
units (/SA option). Device configuration can be performed in-band
using the built-in http server. In-band device and link management
using a GUI can be performed with the aid of Optelecom-NKF utility
programs based on the MX protocol. In an EB-2 type power supply
cabinet, the switches can be configured and managed with the SNM
protocol [variable by name protocol not implemented].
1
SW
DC
P6
P5
6
5
4
3
2
1
2. Front panel features
The 1800 SW front panel, shown in figure 1, has features as listed in
table 1 below and represented in figure 1.
Feature
Connectors
Optical LC (dual), 5, 6
RJ45, jack, 4x (1-4)
Status LEDs
*DC
green
yellow
(upper)
*1-*4
green
(lower)
off
*P5, *P6
green
Function
optical Ethernet ports
10/100TX Ethernet ports
Figure 1. XSNet 1800 SW front panel
DC power OK
link speed 10 Mbit/s
blinking: data activity
link speed 100 Mbit/s
blinking: data activity
no connection
green: sync OK
blink: data activity
off: no sync received
Table 1. Front panel connectors and indications
{
3
3. Installation
3.1. Initial configuration notes
Before installing and trying to link up the switch in a network, please read the separate guide detailing
how to set the IP address and subnet mask, and if necessary the gateway address, for initial installation.
3.2. Hardware installation
A Eurocassette module will slot into an Optelecom-NKF power supply cabinet, model MC 11 or similar. A
stand-alone model may be mounted in any suitable environment that will not make it overheat or malfunction in
other respects: some natural air circulation, moisture lockout and prevention of dust or grime accumulation are
always desirable.
The switch will power up in a few seconds, performing auto-negotiation on the 10/100 Mbit ports. The
Spanning-Tree Protocol (if applicable) and Rapid Spanning-Tree protocol have convergence times of 10-30 and
typically 4 seconds, respectively. Generally, the ports will all be up and running within a minute after powering
up into a network.
3.3. Software installation
Only the items needed for putting the switch into operation, and some auxiliary features, will be described here.
With in-band configuration using the built-in HTML pages, the main switch parameters can be set. The
following chapters contain a description of how to go about this.
4
XSNet 1800 SW
Part II: Configuration pages
1. Logging in
Logging in to the XSNet 1800 SW internal http server enables the user to configure the switch without using
separate application software. A standard Web browser will suffice to find the module by its IP address.
Activate the LOGIN button on the login screen that will appear (see figure 1 below).
Figure 1. Part of the first screen: Login pane
After the Connect box appears (see below), a fresh module can be accessed as follows:
-
login as ‘admin’
leave the password field blank
activate the OK button or press ‘Enter’
Figure 2. Login box
5
After completing login, the Home page (see the Homepage section) will appear.
Figures 3a,b. Page selection menu (left) and port connections
The other HTML pages can be called up next from the navigation menu appearing in the top left corner of each
page (figure 3a); each page may consist of several sections. Each section has an information button
, which
can be activated to display help.
The HTML pages share the following features:
-
a menu to access the pages (see figure 3a)
a diagram (figure 3b) showing which ports are in use, i.e. connected to another active device
panes (sections) showing parameter values, some of which are editable
buttons, mainly SAVE, REFRESH and CANCEL, for sections with editable fields
Writing changes into the device after editing is done by activating the SAVE button.
The actual values still in the device are shown using the REFRESH button.
Activating CANCEL undoes any changes made before saving and shows the values as they were before editing.
Main operational variables and modes to be set are (see also figure 3a):
-
Network addresses
Port speed and mode
Unicast and multicast
RSTP (spanning tree/rapid spanning tree protocol) settings
6
2. XSNet 1800 Home page
This page (see figure 4) has the following sections:
-
Identification pane: administrative data, including the article code, serial number, software version, and
uptime
Labels pane: label entries (editable)
Status pane: an alarm status overview (alarms active or not), including the level of the highest occurring
configured alarm (Module status field).
Figure 4. Home page, with Identification, Labels and Status sections
On this page, only the 32-character labels can be edited; please activate the SAVE button if after making changes
you wish to make them definitive and active. However, if you decide to stop editing and return to view the
original values, use either the REFRESH or the CANCEL button.
The Module status will be ‘OK’ if there is no configured alarm active (see the Alarms page); otherwise it could
appear as a character from A-N, depending on the alarms configuration.
7
3. XSNet 1800 network settings
Figure 5. Network page
For correct functioning of the 1800 SW, it is essential to set its network addressing to be compatible with the
subnet it is hooked into; see figure 5.
The Network settings pane shows the IP address. It is essential to set at least this address correctly and to
keep the value on record, otherwise management of the switch will require special software. Note that the
subnet address is also required.
After setting a new IP address, press the REBOOT button to activate the new setting. In-band communication
with the 1800 SW will be interrupted and the user will have to contact the device again using the new IP address.
The Subnet and Gateway settings show the subnet mask and default gateway. Assuming the device IP address
and subnet mask are already set correctly, only the default gateway needs to be defined in order to connect the
network segment to others.
The entries in the MX alarm settings pane serve to support a video IP system using the MX protocol. The setting
shown (255.255.255.255) indicates the MX packets are being broadcast.
After filling in the addresses, use the SAVE button to set them.
8
4. XSNet 1800 SW alarms
The Alarms settings page shows the Status and Alarm level settings panes. In the Status pane, the Module Status
entry shows the highest level of the occurring and configured alarms, while the other fields in that pane represent
the actual status of some alarms. These alarms are not necessarily assigned a level; this can be done in the pane
‘Alarm level settings’.
Figure 6. Switch alarms configuration page
Alarm levels can be set to A-N, or to ‘_’ (equivalent to ‘O’), the latter meaning no alarm level set. In the
example screenshot, one alarm level was already set and another was in the process of being set. Setting an alarm
level A-N also means the alarm will actually go off if a certain condition is met. For the 1800 SW, these
conditions are:
Power supply alarm
Temperature alarm
Link loss alarm (port 5)
Link loss alarm (port 6)
Bad connection alarm
(ports 5 & 6)
Indicates an active power supply alarm (2V5 or 3V3
outside 5% of their nominal value)
Indicates an active temperature alarm (temperature above
the selected value, default is 70oC)
Indicates link of 100 Mbit port 5 is down
Indicates link of 100 Mbit port 6 is down
Indicates whether FX ports 5 and 6 together experienced
more than 10 000 CRC errors (value can be changed
using suitable software)
After setting an alarm level, first activate the SAVE button, then the REFRESH button to update other values
displayed.
9
5. 1800 SW VLANs
XSNet 1800 switches support up to 50 virtual tagged LANs, organizing ports into separate groups. These
VLANs are to be enabled from the VLAN Control menu with at least one entry in the VLAN Port Control menu,
and a management VLAN defined. The latter is essential: without it, all in-band contact with the switch would
be lost. So: define a management VLAN first before enabling VLANs.
The 802.1q tags can contain a VLAN ID and/or a priority level. If only the latter is present, the VID is zero; the
frame is then called a ‘P-frame’ (priority-only frame) not to be confused with a pause frame.
VLAN entries: defining an 1800 SW tagged VLAN
On the VLAN Entries page, use the edit window (see figure 7) to fill in a row for each VLAN you want to
define. For each port, two entries must be considered:
-
the port VLAN membership, indicating that a port should be a member of the VLAN to be defined
(membership of more than one VLAN is of course allowed)
untag (i.e. remove Q-tags), indicating that tags holding VLAN and priority information should be
removed from the output.
For a port connected to another switch, there should be no untagging if the VLAN extends over several
switches. For edge ports, the stream should generally be untagged.
A management computer should be connected to an untagging VLAN port unless the application running on it
and the network interface card involved will handle Q-tags sensibly.
Figure 7. 1800 SW VLAN entries. The arrow indicates the edit window
By clicking on an existing VLAN entry, it can be edited in the edit window, indicated by the arrow. Pressing
SAVE will consolidate the modified entry if the VLAN ID did not change, or add an entry if a new VLAN ID
was added.
Pressing the DELETE button while an entry is present in the edit window will irrevocably disable and remove
that VLAN.
Remember to use the SAVE button to store your VLAN definitions and settings.
Before enabling VLANs on the VLAN control page, be certain to fill in matching VLAN IDs in the VLAN Port
Control pane there.
10
VLAN Control and VLAN Port Control
Before any entry on this page is made, the list on the VLAN Entries page must be filled in.
Figure 8. 1800 SW VLAN control and Port Control settings
If - in the VLAN Control pane - the VLAN Enable box is checked, it is possible to add, remove or modify
Q-tags in packets, according to the ingress rules set in the VLAN Port Control pane (see figures 8 and 11).
If VLANs are enabled, the following ingress options are available:
- incoming Q-tagged frames can be modified as follows (see figure 9):
-
they can be left as they are
the VLAN ID can be changed
both VLAN ID and priority can be changed.
This can be done with the ‘Q-frame’ selection box (see figure 9 below):
Figure 9. 1800 SW VLAN Control , Q-frame menu options
11
- incoming non-Q frames can be handled as follows (see figure 10):
-
a default Q-tag can be inserted
the priority inside the tag is preserved (this if the VLAN ID is zero but a priority value is set)
they can be dropped ( this also for tags in which the VLAN ID is zero)
Figure 10. 1800 SW VLAN Control , non-Q-frame menu options
This can be done with the ‘non-Q frames’ selection box, with the exception of the framesdropping, which is set
by ticking the checkboxes of the ‘Drop non-Q-frames’ row in the VLAN Port Control pane (see figure 11
below).
The ingress rules are defined per port, in the VLAN Port Control pane. There, any port can be configured to drop
non-Q-frames (arrow in figure 11). If set, this has prevalence over tag insertion or modification.
Figure 11. 1800 SW VLAN port ingress rules
Settings example
With VLANs enabled, a port connected to another switch (a non-edge port) would generally be set to:
-
drop non-Q-frames (ingress, per port),
do not untag Q-frames (egress, per port, per VLAN)
An edge device generally does not handle received Q-tags or send such tags. However, at the switch input port, a
Q-tag may be inserted holding a VLAN ID and priority assigned to the device according to the ingress rules
defined in the VLAN Port Control pane, so VLAN Control settings for an edge port would be:
-
untag (egress, per port, per VLAN)
insert default Q-tag (ingress).
The default Q-tag (per port) is defined on the VLAN Control page, under VLAN Port Control.
12
Application example
Internet
Ports 5, 6 are members of
VLAN v1, v5, v10
SW 1
SW 2
IP : 137. 92. 254. 10
Router
tagged frames
IP : 137. 92. 254. 11
vid 1 , 5 , 10
6
6
5
4
5
v5
4
vid 1 , 5 , 10
3
v1
2
v1
1
1
untagged frames
untagged frames
PC
101
v5
tagged frames
3
2
Ports 5, 6 are members of
VLAN v1, v5, v10
PC
203
Figure 12. 1800 SW switches with two VLANs
With the switches SW 1 (137.92.254.10) and SW2 (.11) interconnected (see figure 12), traffic between the
switches should include all packets that have any business on the other switch; this includes the management
packets coming from elsewhere in the network.
Three VLANs (v1, with VLAN ID 1, v5, with VLAN ID 5, and the management VLAN, with ID 10) are
indicated; the other ports belong to other VLANs, either local to the switches or extending over other switches.
At least one port connected to the network must be a member of VLAN 10.
The two PCs (101, 203) connected to the VLAN 1 ports are transmitting and receiving untagged packets. With
VLANs enabled, the ports would be configured as follows:
SW1, port 1; SW2, port 2:
- port ingress: tag with VLAN ID 1 (which would be the most logical choice), priority 0-7
- port egress: untag the VLAN 1 packets going to the device
Both switches, ports 5:
- ingress: Q-frames must be left as they are, non-Q-frames are to be blocked
- egress: here, both ports are member of all three VLANs indicated, so at least the packets tagged with
any of the VIDs (1, 5, 10) indicated are transmitted
SW2, port 6:
If any of the VLANs indicated stretch over more than these two switches, at least the packets belonging to those
VLANs are to be sent out; in the drawing, this port is a member of all VLANs indicated. In any case,
management (VLAN 10) packets must be allowed to travel over the whole network, to allow switch management
from anywhere.
13
6. XSNet 1800 SW Quality of Service (QoS)
Figure 13. The example has QoS enabled, weights of 4 and 1, ports 1-3 set to high priority, and a TCI-threshold of 4.
Enabling QoS on the 1800 SW instates two priority levels (high/low) and corresponding queues, used in case of
network congestion. These levels can be defined as follows:
-
Port based: tagged and untagged frames entering a port marked ‘high’ go to the high-priority queue.
Priority based: per Q-frame (only priority level 0-7 in tag is important). A TCI lo/hi threshold of 1-7
must be set. Tagged frames with a priority level equal to the TCI-threshold and up go into the highpriority queue.
(TCI = tag control information)
Fulfilling either of these two conditions (see the arrows in figure 13) will get a frame into the high-priority
queue.
The H-weight and L-weight entries (values allowed are 0-15), defining how fast the queues are handled, must be
set. They are defined as:
-
H-weight = m (default 4): after handling maximum of m high-priority frames, start with low-priority
frames
L-weight = n (default 1): after a maximum of n low-priority frames, return to handling high-priority
frames.
14
7. XSNet 1800 SNMP management by traps and/or polling
Introduction
To prepare the XSNet 1800 switch for SNMP management, the database documenting the 1800’s variables
amenable to readout and/or modification must be registered with the program; such SNMP MIB documents are
available from our web site.
The System Information pane (on the SNMP HTML page, see figure 14) shows the network/device data
specifically made available to the SNMP manager for making the device, its location and service manager(s)
traceable.
You will always need to set the community strings (names) in the Communities pane to conform to those
configured in the SNMP manager. Often, these are ‘public’, mainly used for the read and trap communities, and
‘private’ or ‘netman’, for read-write operations. The manager software may offer additional choices.
Figure 14. 1800 SW SNMP settings
Traps
Traps generated by the XSNet 1800 SW can be caught by any SNMP manager. Traps can be generated by
configuring an alarm level A-N on the Alarm settings page for the available events or variables to be monitored
using the SNMP manager program.
In the Traps pane (figure 14), at least the following information must be entered:
- the SNMP version used
- the IP address associated with the manager program, and the destination port (162 is a sensible default).
If desired, an alternative destination IP can be added. It is also possible to add an authentication trap to be able to
catch attempts at access using the wrong community string.
15
The 1800 SW will always generate cold boot and port link up traps (if connected) while booting; this behaviour
is fixed through using the SNMP MIB group mgmt:snmp:snmp-Traps:TrapsInfo (in RFC1213-MIB). Linkdown/up traps will be sent when a port is disconnected and connected, respectively.
Polling
Depending on facilities offered by the SNMP manager, a number of variables can be read out and in a few cases
be edited and set. Many 1800 SW variables are contained in the ‘system’ and ‘interfaces’ sections of RFC1213MIB.
The examples and drawing are taken from the Castle Rock SNMPc manager.
Figure 15. Part of the 1800 SW port table called up using Castle Rock’s SNMPc
Figure 16. A number of devices centred around two switches connected to a management PC; diagram drawn by hand in
Castle Rock’s SNMPc.
16
8. XSNet 1800 SW RSTP
Introduction
Rapid Spanning Tree Protocol (RSTP) is an evolution of the Spanning Tree Protocol (802.1D standard) and
provides for faster spanning tree convergence after a topology change.
Figure 17. XSNet 1800 SW (R)STP settings
When RSTP is enabled, it ensures that only one path at a time is active between any two nodes in the network.
We recommend that you enable RSTP on all switches to ensure that only single active paths in the network exist.
The RSTP uses a distributed algorithm to select a bridging device (STP-compliant switch, but it could be a
bridge or router) that serves as the root of the spanning tree network. Then it selects a root port on each switch
(except for the root device) which incurs the lowest path cost when forwarding a packet from that device to the
root device. Thirdly, it designates a switch in each LAN which incurs the lowest path cost when forwarding a
packet from that LAN to the root device. Viewed from the root device, all ports connecting to (the root ports of)
designated switches are assigned as designated ports. After determining the lowest-cost spanning tree, the RSTP
enables all root ports and designated ports, and disables all other non-edge ports. Network packets are therefore
only forwarded between root ports and designated ports, eliminating any possible network loops.
The 1800 SW and RSTP
The XSNet 1800 SW can use the Rapid Spanning Tree Protocol, which can be enabled or disabled for the switch
as a whole, not per VLAN. Port configuration for this protocol works as follows (see the tables in figure 17):
-
under General RSTP settings, specify the values for Bridge priority, Forward delay, Hello time and
Max age. Generally, the defaults shown will suffice.
under RSTP port settings (third pane, Admin Edge column), specify for each port whether it is an edge
port (connected to an end device), or a non-edge port (such as a backbone port)
specify path cost and priority.
SAVE the RSTP configuration, after enabling RSTP on the General RSTP settings pane.
17
Each port 1-6 can be set to be either an edge port or a non-edge port. Edge ports should not be connected to form
loops, since rapid spanning-tree will ignore edge ports. Optical ports 5-6 are factory set to be non-edge ports;
ports 1-4 are set to edge.
RSTP related terminology is explained in table 1.
By default, RSTP is on unless another connected switch within reach of the algorithm is set to use STP.
RSTP Parameter
Priority (bridge)
Max Age
Hello Time
Description
The priority value is used to identify the root bridge. The bridge with the
lowest value has the highest priority and is selected as root. Enter a value
from 1 to 61440.
The Max Age value is the number of seconds a bridge waits without
receiving Rapid Spanning Tree Protocol configuration messages before
attempting a reconfiguration. Enter a time in seconds from 6 to 40.
The Hello time value is the time between the transmissions of Rapid
Spanning Tree Protocol configuration messages. Enter a time in seconds
from 1 to 10.
Forward Delay time The forward delay time is the number of seconds a port waits before
changing from its Rapid Spanning Tree Protocol learning and listening
states to the forwarding status. Enter a time in seconds from 4 to 30.
Port Priority
A port's priority in becoming the root port. The allowed range is between
0-255. Its default setting is 128. The lowest number has the highest priority.
Path Cost
Specifies the path cost of the port. The Switch uses this to determine which
ports are the forwarding ports. The lowest numbers assigned are the
forwarding ports. The range is between 1 and 65535 and the default values
based on IEEE802.1d are:
10Mb/s = 50-600 100Mb/s = 10-60 1000Mb/s = 3-10
EdgePort
Users can enable this option if an interface is attached to a LAN segment
that is at the end of a bridged LAN or to an end node. Specifying EdgePorts
provides quicker convergence for devices such as workstations or servers,
retains the current forwarding database to reduce the amount of frame
flooding required to rebuild address tables during reconfiguration events,
does not cause the spanning tree to initiate reconfiguration when the
interface changes state, and also overcomes other STP-related timeout
problems. However, remember that EdgePort should only be enabled for
ports connected to an end-node device.
Port Role, Port State This will display the ports' roles and states as per their settings. See table 2
below for an RSTP/STP state equivalence table.
Table 1. RSTP glossary
STP (802.1D)
Port State
Disabled
Blocking
Listening
Learning
Forwarding
RSTP (802.1w)
Port State
Discarding
Discarding
Discarding
Learning
Forwarding
Port Included in
Active Topology?
No
No
Yes
Yes
Yes
Table 2. STP and RSTP port states.
18
Port Learning
MAC Addresses?
No
No
No
Yes
Yes
With RSTP not enabled, the switch is still compatible with STP switches, but will not actively partake in the
STP configuration: the ports are all forwarding (see figure 18).
To force full compatibility with STP-only equipment from the start, you will need additional MX configuration
software (set the internal variable Force Version to zero).
Figure 18. XSNet 1800 SW (R)STP with RSTP not enabled
19
9. XSNet 1800 multicast settings
The 1800 SW series switches support multicasting, each group of receivers listening to its own source. Inside a
switch, regular unicast traffic only passes through the central switch matrix, unaffected by the multicast switch
mode. Multicast streams are processed separately, but can share ports with unicast streams.
If multicasting is being used and non-backbone port output is needed, the switch mode needs to be set to 'IGMP
enabled' (see figure 19, first entry under ‘Multicast settings’).
On this page, each port can be set to one of the following modes when the switch handles multicasting:
- Transmitter mode: the switch will block all outgoing multicast traffic for this port. Multicast traffic entering
the port from outside will pass, so this is a switch entry port for a multicast transmitter.
- Receiver mode: outgoing multicast traffic will be allowed to pass, incoming multicast traffic is blocked.
- Backbone port (all multicast): all multicast traffic will internally be forwarded to and appear on the port,
irrespective of IGMP queries or IGMP memberships.
On receipt of a leave message, a port will either (1) if it is an non-edge port, ignore it because still other clients
may have subscribed themselves to that particular multicast stream, or (2) if it is an edge port (such as in an endnode device), be disabled for this stream.
Figure 19. XSNet 1800 SW multicast settings
20
10. XSNet 1800 SW Port Settings
While in a network, enabled ports in the 1800 SW will have to use a link mode compatible with ports of
connected devices. This can be done by selecting auto-negotiation (see the ‘link mode’ column in the table
below) or by setting duplex/half duplex and link speed per port manually. The negotiation results appear in the
speed, duplex and pause (the switch is able to send and receive pause frames) columns. If auto-negotiation is
used, enabling, sending and receiving of pause frames is automatic.
Note however that the high-speed ports 5 and 6 only offer auto-negotiation or, if this is set to off, the fixed
setting 100 Mbit full duplex.
Figure 20. XSNet 1800 SW port/link settings
21
11. XSNet 1800 SW port statistics
Figure 21. XSNet 1800 SW port statistics
The 1800 SW port loads are represented in figure 21. Transmit and receive port loads are shown in terms of
maximum loads (per port) in the upper two graphs, while received packet size and error statistics are depicted in
the lower two.
22
12. XSNet 1800 Reboot and restore
From this page (figure 22), the 1800 SW can be rebooted, either keeping its settings, only keeping its network
settings, or restoring all factory defaults, including its network settings:
Figure 22. XSNet 1800 SW Rebooting and restoring settings
-
in the field marked ‘Reboot’ (figure 23), the ‘Stay operational’ option does exactly what it says: the unit
will continue to operate even if the REBOOT button is activated (the similar button on the Network
page however always makes the switch reboot).
Figure 23. XSNet 1800 SW Reboot options
-
with the option ‘Reboot’, the switch will retain all its settings when rebooting with the option ‘Keep
settings’ under ‘Restore default settings’ (figure 24). This can for instance be used after changing
network settings. However, in the latter case, rebooting is best done from the Network page. The other
option ‘Restore factory defaults’, should be used judiciously.
Figure 24. XSNet 1800 SW Reboot options
-
‘Erase network settings and reboot’ resets the network settings to their default values
23
Overview of reboot/restore:
‘Reboot option’
stay operational
reboot
‘Restore default settings’ option
any setting
keep settings
reboot
restore factory defaults
erase network settings and reboot
erase network settings and reboot
keep settings
restore factory defaults
24
Effect on reboot
will do nothing
reboot the switch without changing
values
resets all user values except
network settings
network settings reset
full reset
13. Technical specifications
14. Safety, EMC and ESD Information
General
XSNet 1800 SW
1800
/SM-10,
BiDi
1800
/SM-60,
/CWDM-λ
The safety information contained in this section, and on
other pages of this manual, must be observed whenever this
unit is operated, serviced, or repaired. Failure to comply with
any precaution, warning, or instruction noted in the manual
is in violation of the standards of design, manufacture, and
intended use of the unit.
Installation, adjustment, maintenance and repair of this
equipment are to be performed by trained personnel aware of
the hazards involved. For correct and safe use of the
equipment and in order to keep the equipment in a safe
condition, it is essential that both operating and servicing
personnel follow standard safety procedures in addition to the
safety precautions and warnings specified in this manual, and
that this unit be installed in locations accessible to trained
service personnel only.
Optelecom-NKF assumes no liability for the customer’s
failure to comply with any of these safety requirements.
1800
/MM
Optical
Optical ports
Output wavelength
Laser type
Receiver PIN
Ribre type
Housing
Optical span
Min. fibre length
2 x 100 BASE-FX
1310 nm, or
1550, or
850 nm
1310/1490
CWDM
On request (SFP package dependent)
On request (SFP package dependent)
2x2x SM
2x2x SM
2x2x MM
or 2x1x
SM (BiDi)
SFP (MSA compliant)
10 km
60 km
> 2 km
2m
2m or
2m
>10 km
(CWDM)
Performance
Address table size
Switching method
Switching fabric
UL/IEC/EN 60950-1: General safety requirements
4k entries
store and forward
non- blocking
The equipment described in this manual has been
designed and tested according to the UL/IEC/EN 60950-1
safety requirements.
If there is any doubt regarding the safety of the equipment, do
not put it into operation. This might be the case when the
equipment shows physical damage or is stressed beyond
tolerable limits (e.g. during storage and transportation).
Before opening the equipment, disconnect it from all power
sources. The equipment must be powered by a SELV*) power
supply.
When this unit is operated in extremely elevated temperature
conditions, it is possible for internal and external metal
surfaces to become extremely hot.
Ethernet I/Os
Number of ports
10/100Base-TX
802.3u
100Base-FX
Full-duplex 802.3x
6
4
2
yes
Standards
IEEE 802.3
IEEE 802.3a,b
IEEE 802.3u
IEEE 802.3x
IEEE 802.1d
IEEE 802.1d/t/w/z
RFC 2236
10BASE-T
100BASE-FX
100BASE-TX
Full-duplex operation
Spanning Tree Protocol
Rapid Spanning Tree Protocol
IGMP v2
EMC
The equipment has been tested and found to meet the CEregulations relating to EMC, and complies with the limits
for a Class B device, pursuant to Part 15 of the FCC rules.
These limits are designed to provide reasonable protection
against interference to radio communications in any
installation. The equipment generates, uses and can radiate
radio frequency energy; improper use or special
circumstances may cause interference to other equipment or a
performance decrease due to interference radiated by other
equipment. In such cases, the user will have to take
appropriate measures to reduce such interactions between this
and other equipment.
Any interruption of the shielding inside or outside the
equipment could cause the equipment to be more prone to fail
EMC requirements.
Non-video signal lines must use appropriate shielded CAT5
cabling (S-FTP), or at least an equivalent.
If system components, such as cabling (e.g. coaxial cable,
data/audio/cc wiring) and/or the units, are used outdoors,
ensure that all electrically connected components are
carefully earthed and protected against surges (high voltage
transients caused by switching or lightning).
Powering
Power consumption
Supply current
Rack-mount units
Stand-alone units
(/SA)
<6W
0.6 A
MC 1x power supply cabinets
11 to 19 Vdc
(PSA 12 DC/25) or PSR 12 DC
Management
LED status indicators
DC LED
Sync port 5, 6
LED port 1 t/m 4
network management
power- on indicator OK = GREEN
link = GREEN; link activity =
GREEN blinking ; no link = off
10 Mb = YELLOW ; 100 Mb =
GREEN; blink is activity
SNM™ compatible / out-of-band
MX/IP™ inband
Environmental and safety
Operating temperature
Relative humidity
MTBF
General safety
UL recognition file
Laser safety
EMC emission
EMC immunity
-40 to + 74°C
< 95 % (no condensation)
> 100,000 h
IEC/EN 60950-1
E242498
IEC 60825-1, IEC 60825-2
EN 55022 (class B),
FCC 47 CFR 15 (class B)
EN 55024, EN 50130-4, EN 61000-6-2
ESD
Electrostatic discharge (ESD) can damage or destroy
electronic components. Proper precautions should be
taken against ESD when opening the equipment.
Mechanical
Optical connectors
Network connectors
Dimensions
Weight (approx.)
Housing
duplex LC
RJ45 (8x)
128 mm x 34 mm x 190 mm (7TE)
900 gram
rack-mount or stand-alone
*)
SELV: conforming to IEC 60950-1, <60VDC output, output
voltage galvanically isolated from mains. All power supplies or
power supply cabinets available from Optelecom-NKF comply
with these SELV requirements
25